[Cryptography] handling the "Double Spend Problem" pure cryptography and math (no consensus)

Peter Fairbrother peter at tsto.co.uk
Wed Apr 16 14:50:34 EDT 2025


On 13/04/2025 14:53, Cryptskii via cryptography wrote:
[...]

> https://eprint.iacr.org/2025/592

Very hard to read, and full of word-salad/AI alarm signs. It also put a 
lot of stuff that is fairly normal in new fancy words and claimed it as 
new :(.

Anywhoo, I skimmed to page 54 (of 116) and couldn't see how it solved 
the double-spend problem.

Could we have that part on a postcard please?

Hint: Alice has some state on her mobile phone device which allows her 
to convince Bob etc's device that she can/is paying him offline without 
reference to any other devices anywhere. Why can't she clone the state 
and repeat with Charles or Dan or Ellie or Fred's devices...? Note, no 
reference to any other device is allowed until much later.

I personally think it is impossible to prevent this double-spend attack, 
bicbw. Data is not like things - If I give you a thing I no longer have 
it, if I give you some data I can still have it too.


Peter Fairbrother





More information about the cryptography mailing list